Yi Mu
Título
Citado por
Citado por
Ano
On the security of certificateless signature schemes from Asiacrypt 2003
X Huang, W Susilo, Y Mu, F Zhang
International Conference on Cryptology and Network Security, 13-25, 2005
4142005
Certificateless signature revisited
X Huang, Y Mu, W Susilo, DS Wong, W Wu
Australasian Conference on Information Security and Privacy, 308-322, 2007
3642007
Malicious KGC attacks in certificateless cryptography
MH Au, Y Mu, J Chen, DS Wong, JK Liu, G Yang
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2702007
Constant-Size Dynamic k-TAA
MH Au, W Susilo, Y Mu
International conference on security and cryptography for networks, 111-125, 2006
2512006
One-atom lasers
Y Mu, CM Savage
Physical Review A 46 (9), 5944, 1992
2461992
Asymmetric group key agreement
Q Wu, Y Mu, W Susilo, B Qin, J Domingo-Ferrer
Annual International Conference on the Theory and Applications of …, 2009
2192009
Privacy-preserving decentralized key-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Yan
IEEE Transactions on Parallel and Distributed Systems 23 (11), 2150-2162, 2012
2042012
Identity-based strong designated verifier signature schemes
W Susilo, F Zhang, Y Mu
Australasian Conference on Information Security and Privacy, 313-324, 2004
1882004
Dual-server public-key encryption with keyword search for secure cloud storage
R Chen, Y Mu, G Yang, F Guo, X Wang
IEEE transactions on information forensics and security 11 (4), 789-798, 2015
1732015
CP-ABE with constant-size keys for lightweight devices
F Guo, Y Mu, W Susilo, DS Wong, V Varadharajan
IEEE transactions on information forensics and security 9 (5), 763-771, 2014
1642014
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Zhou, MHA Au
IEEE transactions on information forensics and security 10 (3), 665-678, 2014
1612014
Certificate-based signature: security model and efficient construction
J Li, X Huang, Y Mu, W Susilo, Q Wu
European Public Key Infrastructure Workshop, 110-125, 2007
1502007
Multi-identity single-key decryption without random oracles
F Guo, Y Mu, Z Chen, L Xu
International Conference on Information Security and Cryptology, 384-398, 2007
1232007
Personal health record systems and their security protection
KT Win, W Susilo, Y Mu
Journal of medical systems 30 (4), 309-315, 2006
1172006
Perfect concurrent signature schemes
W Susilo, Y Mu, F Zhang
International Conference on Information and Communications Security, 14-26, 2004
1122004
Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation
Y Zhang, C Xu, X Liang, H Li, Y Mu, X Zhang
IEEE Transactions on Information Forensics and Security 12 (3), 676-688, 2016
1112016
Cryptanalysis of simple three-party key exchange protocol
H Guo, Z Li, Y Mu, X Zhang
Computers & Security 27 (1-2), 16-21, 2008
1092008
Efficient generic on-line/off-line signatures without key exposure
X Chen, F Zhang, W Susilo, Y Mu
International Conference on Applied Cryptography and Network Security, 18-30, 2007
1032007
Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world
X Huang, W Susilo, Y Mu, F Zhang
19th International Conference on Advanced Information Networking and …, 2005
1012005
Optical image encryption based on chaotic baker map and double random phase encoding
AM Elshamy, ANZ Rashed, AENA Mohamed, OS Faragalla, Y Mu, ...
Journal of Lightwave Technology 31 (15), 2533-2539, 2013
1002013
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–20